Monday, May 27, 2024

Report: 76 million malicious URLs accessed in PH in 2023

Cybersecurity firm Trend Micro has revealed a 10% annual increase in total threats blocked in 2023 as detailed in its latest report, which warned that attackers are using more advanced methods to target fewer victims with the potential for higher financial gains.

“We’re blocking more threats than ever before for our customers. However, adversaries showed a variety and sophistication of tactics, techniques, and procedures (TTPs) in their attacks, especially in defense evasion,” said Ian Felipe, Trend Micro Philippines country manager.

“As our report demonstrates, network defenders must continue to proactively manage risk across the entire attack surface today. Understanding the strategies favored by our adversaries is the foundation of effective defense.”

The company said it blocked 161 billion threats overall in 2023, compared to 82 billion threats five years ago. Some of the key global findings include:

  • Email malware detection surged by 349% year-on-year (YoY), while malicious phishing URL detections declined by 27% YoY — suggesting a trend for more using malicious attachments rather than links directly included in emails
  • Business email compromise (BEC) detections increased 16% YoY
  • Ransomware detections dropped 14%, however, there was a 35% increase in threats blocked under Trend Micro’s File Reputation Services (FRS)

These findings suggest that firstly, threat actors are becoming more prudent about selecting their targets, and secondly, becoming more skilled in bypassing early detection layers.

In the case of malicious emails, for instance, instead of launching large-scale attacks that rely on victims clicking on malicious links in websites and emails, cybercriminals are targeting a smaller pool of higher-profile victims with more sophisticated attacks. This approach helps them evade network and email filters, which could explain the surge in file detections at endpoints.

Similarly, in the case of ransomware, the increase in FRS detections suggests that threat actors are getting better at evading primary detection via techniques such as Bring Your Own Vulnerable Driver (BYOVD) and zero-day exploits, among others.

The report also illuminated threat developments in Southeast Asia in 2023. While Southeast Asia saw an overall increase in ransomware detections, making up more than half (52%) of the global number, this was largely attributed to significant detections within Thailand.

Other markets such as Indonesia, Malaysia, Singapore, and the Philippines saw a decline in ransomware detections, similar to the overall global trend. In the Philippines, the number of ransomware detections fell by 93%.

The report also delved into the Philippine threat landscape in 2023, which revealed that the government was largely targeted in Advanced Persistent Threat (APT) campaigns.

Specifically, the report exposed that adversary groups Earth Estries (active from January 2023 to present) and Mustang Panda (active from August 2023 to present) have been targeting local government organizations.

Earth Estries is known to deploy cyberespionage campaigns and use multiple backdoors and hacking tools, while Mustang Panda utilizes components of legitimate software for Dynamic Link Library (DLL) sideloading to gather user information.

Looking at other threats studied, malicious URLs being accessed in the Philippines remain prevalent. Despite a 20% decline, detections remained high, totaling over 76 million.

A similar trend is seen for other threats, with a high number of detections despite a YoY decline. These include email threats (27%), and botnet victims (27%). Meanwhile, malware detections increased by 12%.

Subscribe

- Advertisement -spot_img

RELEVANT STORIES

spot_img

LATEST

- Advertisement -spot_img